This path made the following update: * Generate SPI randomly. * Correct IKE_SPI_BASE value according RFC 4302/4303. Cc: Ye Ting <ting.ye@intel.com> Cc: Fu Siyuan <siyuan.fu@intel.com> Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Jiaxin Wu <jiaxin.wu@intel.com> Reviewed-by: Ye Ting <ting.ye@intel.com> Reviewed-by: Fu Siyuan <siyuan.fu@intel.com>
		
			
				
	
	
		
			331 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			331 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
|   Common operation of the IKE
 | |
|   
 | |
|   Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
 | |
| 
 | |
|   This program and the accompanying materials
 | |
|   are licensed and made available under the terms and conditions of the BSD License
 | |
|   which accompanies this distribution.  The full text of the license may be found at
 | |
|   http://opensource.org/licenses/bsd-license.php.
 | |
| 
 | |
|   THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
 | |
|   WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | |
| 
 | |
| **/
 | |
| 
 | |
| #include "Ike.h"
 | |
| #include "IkeCommon.h"
 | |
| #include "IpSecConfigImpl.h"
 | |
| #include "IpSecDebug.h"
 | |
| 
 | |
| /**
 | |
|   Check whether the new generated Spi has existed.
 | |
| 
 | |
|   @param[in]   IkeSaSession   Pointer to the Child SA Session.
 | |
|   @param[in]   SpiValue       SPI Value.
 | |
| 
 | |
|   @retval  TRUE    This SpiValue has existed in the Child SA Session
 | |
|   @retval  FALSE   This SpiValue doesn't exist in the Child SA Session.
 | |
|   
 | |
| **/
 | |
| BOOLEAN
 | |
| IkeSpiValueExisted (
 | |
|   IN IKEV2_SA_SESSION      *IkeSaSession,
 | |
|   IN UINT32                SpiValue
 | |
|   )
 | |
| {
 | |
|   LIST_ENTRY              *Entry;
 | |
|   LIST_ENTRY              *Next;
 | |
|   IKEV2_CHILD_SA_SESSION  *SaSession;
 | |
| 
 | |
|   Entry     = NULL;
 | |
|   Next      = NULL;
 | |
|   SaSession = NULL; 
 | |
|     
 | |
|   //
 | |
|   // Check whether the SPI value has existed in ChildSaEstablishSessionList.
 | |
|   //
 | |
|   NET_LIST_FOR_EACH_SAFE (Entry, Next, &IkeSaSession->ChildSaEstablishSessionList) {
 | |
|     SaSession= IKEV2_CHILD_SA_SESSION_BY_IKE_SA (Entry);
 | |
|     if (SaSession->LocalPeerSpi == SpiValue) {
 | |
|       return TRUE;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Check whether the SPI value has existed in ChildSaSessionList.
 | |
|   //
 | |
|   NET_LIST_FOR_EACH_SAFE (Entry, Next, &IkeSaSession->ChildSaSessionList) {
 | |
|     SaSession= IKEV2_CHILD_SA_SESSION_BY_IKE_SA (Entry);
 | |
|     if (SaSession->LocalPeerSpi == SpiValue) {
 | |
|       return TRUE;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return FALSE;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Call Crypto Lib to generate a random value with eight-octet length.
 | |
|   
 | |
|   @return the 64 byte vaule.
 | |
| 
 | |
| **/
 | |
| UINT64
 | |
| IkeGenerateCookie (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   UINT64     Cookie;
 | |
|   EFI_STATUS Status;
 | |
| 
 | |
|   Status = IpSecCryptoIoGenerateRandomBytes ((UINT8 *)&Cookie, sizeof (UINT64));
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return 0;
 | |
|   } else {
 | |
|     return Cookie;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Generate the random data for Nonce payload.
 | |
| 
 | |
|   @param[in]  NonceSize      Size of the data in bytes.
 | |
|   
 | |
|   @return Buffer which contains the random data of the spcified size. 
 | |
| 
 | |
| **/
 | |
| UINT8 *
 | |
| IkeGenerateNonce (
 | |
|   IN UINTN              NonceSize
 | |
|   )
 | |
| {
 | |
|   UINT8                  *Nonce;
 | |
|   EFI_STATUS             Status;
 | |
| 
 | |
|   Nonce = AllocateZeroPool (NonceSize);
 | |
|   if (Nonce == NULL) {
 | |
|     return NULL;
 | |
|   }
 | |
| 
 | |
|   Status = IpSecCryptoIoGenerateRandomBytes (Nonce, NonceSize);
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     FreePool (Nonce);
 | |
|     return NULL;
 | |
|   } else {
 | |
|     return Nonce;
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Convert the IKE Header from Network order to Host order.
 | |
| 
 | |
|   @param[in, out]  Header    The pointer of the IKE_HEADER.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| IkeHdrNetToHost (
 | |
|   IN OUT IKE_HEADER *Header
 | |
|   )
 | |
| {
 | |
|   Header->InitiatorCookie = NTOHLL (Header->InitiatorCookie);
 | |
|   Header->ResponderCookie = NTOHLL (Header->ResponderCookie);
 | |
|   Header->MessageId       = NTOHL (Header->MessageId);
 | |
|   Header->Length          = NTOHL (Header->Length);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Convert the IKE Header from Host order to Network order.
 | |
| 
 | |
|   @param[in, out] Header     The pointer of the IKE_HEADER.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| IkeHdrHostToNet (
 | |
|   IN OUT IKE_HEADER *Header
 | |
|   )
 | |
| {
 | |
|   Header->InitiatorCookie = HTONLL (Header->InitiatorCookie);
 | |
|   Header->ResponderCookie = HTONLL (Header->ResponderCookie);
 | |
|   Header->MessageId       = HTONL (Header->MessageId);
 | |
|   Header->Length          = HTONL (Header->Length);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Allocate a buffer of IKE_PAYLOAD and set its Signature.
 | |
| 
 | |
|   @return A buffer of IKE_PAYLOAD.
 | |
| 
 | |
| **/
 | |
| IKE_PAYLOAD *
 | |
| IkePayloadAlloc (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   IKE_PAYLOAD *IkePayload;
 | |
| 
 | |
|   IkePayload            = (IKE_PAYLOAD *) AllocateZeroPool (sizeof (IKE_PAYLOAD));
 | |
|   if (IkePayload == NULL) {
 | |
|     return NULL;
 | |
|   }
 | |
|   
 | |
|   IkePayload->Signature = IKE_PAYLOAD_SIGNATURE;
 | |
| 
 | |
|   return IkePayload;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Free a specified IKE_PAYLOAD buffer.
 | |
| 
 | |
|   @param[in]  IkePayload   Pointer of IKE_PAYLOAD to be freed.
 | |
| 
 | |
| **/
 | |
| VOID
 | |
| IkePayloadFree (
 | |
|   IN IKE_PAYLOAD *IkePayload
 | |
|   )
 | |
| {
 | |
|   if (IkePayload == NULL) {
 | |
|     return;
 | |
|   }
 | |
|   //
 | |
|   // If this IkePayload is not referred by others, free it.
 | |
|   //
 | |
|   if (!IkePayload->IsPayloadBufExt && (IkePayload->PayloadBuf != NULL)) {
 | |
|     FreePool (IkePayload->PayloadBuf);
 | |
|   }
 | |
| 
 | |
|   FreePool (IkePayload);
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Generate an new SPI.
 | |
|   
 | |
|   @param[in]      IkeSaSession   Pointer to IKEV2_SA_SESSION related to this Child SA 
 | |
|                                  Session.
 | |
|   @param[in out]  SpiValue       Pointer to the new generated SPI value. 
 | |
|                               
 | |
|   @retval EFI_SUCCESS         The operation performs successfully.
 | |
|   @retval Otherwise           The operation is failed.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| IkeGenerateSpi (
 | |
|   IN  IKEV2_SA_SESSION         *IkeSaSession,
 | |
|   OUT UINT32                   *SpiValue
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS   Status;
 | |
| 
 | |
|   Status = EFI_SUCCESS;
 | |
|  
 | |
|   while (TRUE) {
 | |
|     //
 | |
|     // Generate SPI randomly
 | |
|     //
 | |
|     Status = IpSecCryptoIoGenerateRandomBytes ((UINT8 *)SpiValue, sizeof (UINT32));
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       break;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // The set of SPI values in the range 1 through 255 are reserved by the 
 | |
|     // Internet Assigned Numbers Authority (IANA) for future use; a reserved 
 | |
|     // SPI value will not normally be assigned by IANA unless the use of the 
 | |
|     // assigned SPI value is specified in an RFC.
 | |
|     //
 | |
|     if (*SpiValue < IKE_SPI_BASE) {
 | |
|       *SpiValue += IKE_SPI_BASE; 
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Check whether the new generated SPI has existed.
 | |
|     //
 | |
|     if (!IkeSpiValueExisted (IkeSaSession, *SpiValue)) {
 | |
|       break;
 | |
|     }
 | |
|   }
 | |
|   
 | |
|   return Status;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Generate a random data for IV
 | |
| 
 | |
|   @param[in]  IvBuffer  The pointer of the IV buffer.
 | |
|   @param[in]  IvSize    The IV size.
 | |
| 
 | |
|   @retval     EFI_SUCCESS  Create a random data for IV.
 | |
|   @retval     otherwise    Failed.
 | |
| 
 | |
| **/
 | |
| EFI_STATUS
 | |
| IkeGenerateIv (
 | |
|   IN UINT8                           *IvBuffer,
 | |
|   IN UINTN                           IvSize
 | |
|   )
 | |
| {
 | |
|   return IpSecCryptoIoGenerateRandomBytes (IvBuffer, IvSize);
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|   Find SPD entry by a specified SPD selector.
 | |
| 
 | |
|   @param[in] SpdSel       Point to SPD Selector to be searched for.
 | |
| 
 | |
|   @retval Point to SPD Entry if the SPD entry found.
 | |
|   @retval NULL if not found.
 | |
| 
 | |
| **/
 | |
| IPSEC_SPD_ENTRY *
 | |
| IkeSearchSpdEntry (
 | |
|   IN EFI_IPSEC_SPD_SELECTOR             *SpdSel
 | |
|   )
 | |
| {
 | |
|   IPSEC_SPD_ENTRY *SpdEntry;
 | |
|   LIST_ENTRY      *SpdList;
 | |
|   LIST_ENTRY      *Entry;
 | |
| 
 | |
|   SpdList = &mConfigData[IPsecConfigDataTypeSpd];
 | |
| 
 | |
|   NET_LIST_FOR_EACH (Entry, SpdList) {
 | |
|     SpdEntry = IPSEC_SPD_ENTRY_FROM_LIST (Entry);
 | |
| 
 | |
|     //
 | |
|     // Find the required SPD entry
 | |
|     //
 | |
|     if (CompareSpdSelector (
 | |
|           (EFI_IPSEC_CONFIG_SELECTOR *) SpdSel,
 | |
|           (EFI_IPSEC_CONFIG_SELECTOR *) SpdEntry->Selector
 | |
|           )) {
 | |
|       return SpdEntry;
 | |
|     }
 | |
| 
 | |
|   }
 | |
| 
 | |
|   return NULL;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Get the IKE Version from the IKE_SA_SESSION.
 | |
| 
 | |
|   @param[in]  Session  Pointer of the IKE_SA_SESSION.
 | |
| 
 | |
| **/
 | |
| UINT8
 | |
| IkeGetVersionFromSession (
 | |
|   IN UINT8    *Session
 | |
|   )
 | |
| {
 | |
|   if (*(UINT32 *) Session == IKEV2_SA_SESSION_SIGNATURE) {
 | |
|     return ((IKEV2_SA_SESSION *) Session)->SessionCommon.IkeVer;
 | |
|   } else {
 | |
|     //
 | |
|     // Add IKEv1 support here.
 | |
|     //
 | |
|     return 0;
 | |
|   }
 | |
| }
 | |
| 
 |